Bugnets Could Spy on You via Mobile Devices

Imagine sitting in a café and discussing the details of a business proposal with a potential client. Neither you nor the client has a laptop; you're just two people having a conversation. But unbeknownst to you, someone half a world away is listening to every word you say. Later, as you leave, you receive a text message referring to the proposal and demanding money in exchange for silence.

Recent research from two universities suggests that such a remote-eavesdropping scenario may soon be possible.

According to George Mason University researchers Ryan Farley and Xinyuan Wang, cell phones make excellent surveillance devices for remote snoops. In a paper, Farley and Wang discuss a "modernized mic hijacker" [PDF] that an attacker could control over what they call a "roving bugnet." The eavesdropper would use a piece of malware called a "bugbot" to listen in on in-person interactions via a nearby smartphone or laptop. Such attacks would be more likely to target specific people (a wayward spouse, say) than to play a role in widespread attacks on the general public.

Mobile Malware on the Rise

Though fewer than 500 pieces of cell phone malware have been written since 2004, researchers have seen an explosion within the past year. Mikko Hyppönen, chief research officer for F-Secure, says that 95 percent of mobile malware was written for the Symbian OS, but that's changing fast due to the success of Apple's iPhone and Google's Android OS.

Given the relative scarcity of mobile malware, Farley and Wang conducted experiments on Windows XP and Mac OS laptops. The researchers directed their bugbot to join an Internet Relay Chat channel so that they could remotely enable and disable each laptop's microphone to stream real-time conversations occurring in the area. The same thing, they said, could be done on almost any smartphone.

The researchers were able to hit three specific mobile features, attacking the battery (to keep the user from turning on the phone), GPS services (to snag location data), and voice and messaging (to listen to voice messages and retrieve old texts).

If your smartphone were to be infected in any of those ways, you probably wouldn't even notice--even if you're a sophisticated user. Because security software generally sees operating systems as trustworthy, rootkits tucked deep within an OS can go undetected for a long time. In fact, desktop antimalware products have only recently started to scan for rootkits.

The researchers built their rootkits for Neo Freerunner smartphones, which run the Openmoko Linux-distribution operating system. Google Android uses Linux, and therefore could be attacked right away. The Rutgers team says that with a little work the Linux rootkits could be ported to the Apple iPhone OS, Windows Mobile, and Symbian OS.

The simplest rootkit, which targets a smartphone's battery, would need only to enable Bluetooth or the phone's GPS function to drain the power--and it could do so without your even realizing it. Unless you carefully studied your smartphone, you might not see the tiny icons indicating that multiple power-draining services were enabled. If your phone were infected, you'd find yourself having to recharge it more often--or, when you needed it most, your phone would be dead.

More sinister is the rootkit that grants third-party access to your GPS information. Even when you're not using your mobile phone, the GPS service keeps tabs on your whereabouts; such information, when exposed to a less-than-trustworthy person, would take stalking to a new level.

The most harmful rootkit, however, would access your voice and text messages. The Rutgers team constructed a rootkit that relayed text messages over to a third party. If your phone were so compromised, whenever you sent or received a new text message, a cybercriminal would get a copy, too.

What About the App Store?

Even Apple's tightly controlled iPhone App Store could potentially house malicious apps or bugbots. At Black Hat DC 2010 (a security conference), Nicolas Seriot of the University of Applied Sciences Western Switzerland demonstrated how a malicious program could bypass the App Store's strict filters [PDF]. Seriot, an iPhone developer, suggested that someone with ill intentions could upload a version of his file to the App Store and infect many users' phones before Apple managed to pull it.

Seriot also challenged Apple's assertion that third-party apps on the device are sandboxed so that system files, resources, and the OS kernel are shielded from the user's application space. He showed the audience that a malicious third-party application--not even a rootkit--could provide remote access to the iPhone's contact list, image file, text messages, GPS data, and other vital information. So far, Apple has not directly responded to Seriot's research.

Taking Precautions

As the Rutgers study states, "the pervasive nature of smart phones and a large, unsophisticated user base also make smart phones particularly attractive to attackers." In general, you should be suspicious of phone downloads--even ringtones--as such files could harbor malware. But you also need security software for your phone, sooner rather than later. Fortunately, Eset, F-Secure, Kaspersky, McAfee, and Symantec (Norton) all offer tools that can protect against most mobile malware. And some phone vendors, such as Nokia, now preinstall antivirus on their handsets.

One startup is going a step beyond. In addition to blocking malware, Lookout, a mobile security tool that is free at this writing, offers a suite of defenses: a mobile firewall, mobile data backup (which allows you to return your phone to a preinfected state), and the ability to wipe a lost or stolen phone remotely.

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited. Copyright 2013 IDG Communications.
ABN 14 001 592 650. All rights reserved.

Contact Us

With over 25 years of brand awareness and credibility, Good Gear Guide (formerly PC World Australia), consistently delivers editorial excellence through award-winning content and trusted product reviews.